RSS   Podatności dla 'Myserver'   RSS

2008-11-18
 
CVE-2008-5160

CWE-noinfo
 

 
Unspecified vulnerability in MyServer 0.8.11 allows remote attackers to cause a denial of service (daemon crash) via multiple invalid requests with the HTTP GET, DELETE, OPTIONS, and possibly other methods, related to a "204 No Content error."

 
2007-06-22
 
CVE-2007-3365

CWE-Other
 

 
MyServer 0.8.9 and earlier does not properly handle uppercase characters in filename extensions, which allows remote attackers to obtain sensitive information (script source code) via a modified extension, as demonstrated by post.mscgI.

 
 
CVE-2007-3364

CWE-Other
 

 
Cross-site scripting (XSS) vulnerability in the cgi-bin/post.mscgi sample page in MyServer 0.8.9 allows remote attackers to inject arbitrary web script or HTML via the body content.

 
2007-05-01
 
CVE-2007-2414

 

 
MyServer before 0.8.8 allows remote attackers to cause a denial of service via unspecified vectors.

 
2007-03-21
 
CVE-2007-1588

 

 
server.cpp in MyServer 0.8.5 calls Process::setuid before calling Process::setgid and thus does not properly drop privileges, which might allow remote attackers to execute CGI programs with unintended privileges.

 
2005-05-18
 
CVE-2005-1658

 

 
Directory traversal vulnerability in filemanager.cpp in MyServer 0.8 allows remote attackers to list the parent directory of the web root via a URL with a "..." (triple dot).

 
2004-12-31
 
CVE-2004-2517

 

 
myServer 0.7.1 allows remote attackers to cause a denial of service (crash) via a long HTTP POST request in a View=Logon operation to index.html.

 
 
CVE-2004-2516

 

 
Directory traversal vulnerability in myServer 0.7 allows remote attackers to list arbitrary directories via an HTTP GET command with a large number of "./" sequences followed by "../" sequences.

 
2002-12-31
 
CVE-2002-2240

 

 
Directory traversal vulnerability in MyServer 0.11 and 0.2 allows remote attackers to read arbitrary files via a ".." (dot dot) in an HTTP GET request.

 


Copyright 2024, cxsecurity.com

 

Back to Top